bus law chap 9

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:54 AM on 4/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

Spam

Bulk, unsolicited (junk) e-mail, accounting for roughly 75 percent of all e-mails.

2
New cards

State Regulation of Spam

Many state laws require e-mail ad senders to instruct recipients on how to 'opt out' of further e-mail ads.

3
New cards

U.S. Safe Web Act

Allows the FTC to cooperate with foreign agencies in investigating spamming and provides immunity to ISPs for sharing information.

4
New cards

Federal CAN-SPAM Act

Permits sending unsolicited commercial e-mail but prohibits false addresses and misleading information.

5
New cards

Domain Name

The series of letters and symbols used to identify a site operator on the internet.

6
New cards

Top-Level Domain (TLD)

The part of the domain name to the right of the period indicating the type of entity that operates the site.

7
New cards

Second-Level Domain (SLD)

The part of the domain name to the left of the period, chosen by the entity registering the domain.

8
New cards

Goodwill

The valuable reputation of a business viewed as an intangible asset.

9
New cards

Internet Corporation for Assigned Names and Numbers (ICANN)

A nonprofit corporation overseeing the distribution of domain names and operating an online arbitration system.

10
New cards

Cybersquatting

Registering a domain name that is the same as, or confusingly similar to, another's trademark to sell it back to the trademark owner.

11
New cards

Anti-Cybersquatting Consumer Protection Act (ACPA)

Makes cybersquatting illegal if the domain name is identical or confusingly similar to a trademark and has a bad faith intent to profit.

12
New cards

Typosquatting

A form of cybersquatting that relies on typographical errors made by users when inputting information into a web browser.

13
New cards

Meta Tags

Key words that give internet browsers specific information about a web page, potentially leading to trademark infringement if used without permission.

14
New cards

Applicability of the ACPA

The ACPA applies to all domain name registrations of trademarks, allowing plaintiffs to collect actual or statutory damages.

15
New cards

Statutory Damages under the ACPA

Successful plaintiffs can receive statutory damages ranging from $1,000 to $100,000.

16
New cards

Expectation of Privacy Online

Analyzing when a user has a reasonable expectation of privacy in the online environment.

17
New cards

Litigation and Social Media

Explaining how information on social media can be accessed and used during investigations and litigation.

18
New cards

Role of Internet Service Providers (ISPs)

ISPs play a role in litigating online defamation and may have immunity under certain regulations.

19
New cards

Intellectual Property Infringement Online

Comparing threats to intellectual property infringement in the online environment versus the physical world.

20
New cards

Other Online Torts

Identifying other torts that arise from online conduct.

21
New cards

Trademark dilution

Occurs when a trademark is used without authorization in a way that diminishes the distinctive quality of the mark.

22
New cards

Difference between trademark infringement and trademark dilution

Trademark infringement requires proof of consumer confusion, while dilution does not.

23
New cards

Licensing

A company permits another party to use a trademark or other intellectual property under a license.

24
New cards

Example of licensing in software

When a user downloads an application on a smartphone, they enter into a licensing agreement to use the application.

25
New cards

Restrictions in licensing agreements

Licensing agreements may prohibit sharing files and limit use to specific devices or time periods.

26
New cards

Copyright law

The most important form of intellectual property protection on the internet, as much online material is copyrighted.

27
New cards

Copyright infringement

Occurs when a party downloads software or music into a computer's RAM without authorization.

28
New cards

Criminal penalties for copyright violations

Initially imposed only if unauthorized copies were exchanged for financial gain, but later extended to all unauthorized exchanges.

29
New cards

Digital Millennium Copyright Act (DMCA)

Established civil and criminal penalties for circumventing encryption software and prohibits the manufacture of circumvention devices.

30
New cards

Fair Use under DMCA

The DMCA allows fair use of circumvention methods for educational and noncommercial purposes.

31
New cards

Liability of Internet Service Providers (ISPs) under DMCA

ISPs are not liable for copyright infringement unless they are aware of the violation and fail to act.

32
New cards

File-sharing technology

Accomplished through peer-to-peer (P2P) networking, allowing users to share resources without a central server.

33
New cards

Cloud computing

Delivery of on-demand services from third-party servers over a network, often subscription-based.

34
New cards

Impact of file-sharing on the motion picture industry

File-sharing leads to significant revenue losses annually due to piracy.

35
New cards

Social media

Forms of communication through which users create and share information and content via the internet.

36
New cards

Impact of social media on litigation

Social media posts can provide damaging information and are routinely included in discovery.

37
New cards

Social media and settlement agreements

Posts can invalidate settlement agreements that contain confidentiality clauses.

38
New cards

Use of social media in criminal investigations

Law enforcement uses social media to detect and prosecute criminals, as many boast about illegal activities.

39
New cards

Electronic Communications Privacy Act (ECPA)

Amended federal wiretapping law to cover electronic forms of communications, applicable to social media.

40
New cards

Employers' social media policies

Large corporations may have guidelines for social media use, with violations leading to disciplinary actions.

41
New cards

ECPA

Prohibits the intentional interception of any wire, oral, or electronic communication.

42
New cards

Intentional Disclosure

Prohibits the intentional disclosure or use of information obtained through interception.

43
New cards

Employer Exclusions

Employers can monitor electronic communications through devices they provide, but cannot monitor personal communications without consent.

44
New cards

Stored Communications Act (SCA)

Part of the ECPA, it prohibits intentional and unauthorized access to stored electronic communications.

45
New cards

Protection of Social Media Passwords

Legislation protects individuals from being forced to disclose their social media passwords.

46
New cards

Internal Social Media Networks

Companies use intranets for employee communication, enhancing trade secret protection and providing real-time information.

47
New cards

Cyber Tort

A tort committed via the internet, with online defamation being one of the most prevalent forms.

48
New cards

Defamation

Wrongfully hurting a person's reputation by communicating false statements about them.

49
New cards

Identifying Defamation Authors

Businesses can sue 'John Doe' to uncover identities of anonymous defamers through court orders to ISPs.

50
New cards

Liability of ISPs

Under the Communications Decency Act, ISPs are generally not liable for defamatory statements made by users.

51
New cards

Online Conduct Suits

E-mails, tweets, and posts can lead to various tort claims including defamation and emotional distress.

52
New cards

Privacy Rights

Users' privacy rights are implicitly guaranteed by the Supreme Court and explicitly by some state constitutions.

53
New cards

Reasonable Expectation of Privacy

A person must have a reasonable expectation of privacy to maintain a suit for invasion of privacy.

54
New cards

Cookies

Small files stored in a user's browser to track online behavior and preferences.

55
New cards

FTC Investigations

The FTC investigates privacy violations and can enforce consent decrees against companies.

56
New cards

Privacy Policies

Companies define the privacy rights of online users, though this is changing with increased scrutiny.

Explore top notes

note
AP Biology Course Review Part 1
Updated 1646d ago
0.0(0)
note
Photosynthesis
Updated 570d ago
0.0(0)
note
Venus of Urbino
Updated 1154d ago
0.0(0)
note
Cell cycle 4.6
Updated 108d ago
0.0(0)
note
Impressionism
Updated 1170d ago
0.0(0)
note
Fetal Pig Dissection
Updated 1348d ago
0.0(0)
note
AP Biology Course Review Part 1
Updated 1646d ago
0.0(0)
note
Photosynthesis
Updated 570d ago
0.0(0)
note
Venus of Urbino
Updated 1154d ago
0.0(0)
note
Cell cycle 4.6
Updated 108d ago
0.0(0)
note
Impressionism
Updated 1170d ago
0.0(0)
note
Fetal Pig Dissection
Updated 1348d ago
0.0(0)

Explore top flashcards

flashcards
Vocab Unit 7
20
Updated 1204d ago
0.0(0)
flashcards
Theology Unit 3
90
Updated 1245d ago
0.0(0)
flashcards
Academic Team Math
345
Updated 149d ago
0.0(0)
flashcards
Chapter 13 World Studies BJU
44
Updated 1117d ago
0.0(0)
flashcards
CNA
150
Updated 1124d ago
0.0(0)
flashcards
Cells 22-23
24
Updated 1243d ago
0.0(0)
flashcards
Vocab Unit 7
20
Updated 1204d ago
0.0(0)
flashcards
Theology Unit 3
90
Updated 1245d ago
0.0(0)
flashcards
Academic Team Math
345
Updated 149d ago
0.0(0)
flashcards
Chapter 13 World Studies BJU
44
Updated 1117d ago
0.0(0)
flashcards
CNA
150
Updated 1124d ago
0.0(0)
flashcards
Cells 22-23
24
Updated 1243d ago
0.0(0)